Arama Sonuçları Bilgisayar ağları -- Güvenlik önlemleri.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBilgisayar$002ba$0025C4$00259Flar$0025C4$0025B1$002b--$002bG$0025C3$0025BCvenlik$002b$0025C3$0025B6nlemleri.$0026ps$003d300$0026isd$003dtrue?dt=list2024-11-25T08:53:01ZAğ yönetimi ve bilgi güvenliğient://SD_ILS/0/SD_ILS:5162752024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Bilge, Alper. Kaçmaz, Emre.<br/>Yer Numarası TK5105.59 A98 2021<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Türkiye’de ve dünyada siber güvenlikent://SD_ILS/0/SD_ILS:5149582024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Çeliktaş, Barış .<br/>Yer Numarası UG485 C45 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Uygulamalarla siber güvenliğe girişent://SD_ILS/0/SD_ILS:5101512024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası TK5105.59.A39 U94 2020<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Ethical hacking : (hacking kursu)ent://SD_ILS/0/SD_ILS:4239502024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Usta, Gökhan.<br/>Yer Numarası QA76.9.A25 U88 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Exploit geliştirme 101ent://SD_ILS/0/SD_ILS:3890772024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Akyıldız, M. Alparslan.<br/>Yer Numarası QA76.9.A25 A59 2018<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:5134522024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA76.9.A25 E43 2016<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ulusal bilgi güvenliği :strateji ve kurumsal yapılanma : uzmanlık tezient://SD_ILS/0/SD_ILS:3423782024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Güngör, Murat<br/>Yer Numarası TK5105.5 G975 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Siber istihbaratent://SD_ILS/0/SD_ILS:3840512024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Keleştemur, Atalay<br/>Yer Numarası QA76.9.A25 K45 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Ağ ve yazılım güvenliğient://SD_ILS/0/SD_ILS:3797582024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Çontar, Furkan.<br/>Yer Numarası TK5105.59 C66 2015<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Tam kapsamlı sanal test laboratuvarı kurulumu ve uygulamalı sızma testlerient://SD_ILS/0/SD_ILS:5134672024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Yalçınkaya, Mehmet Ali, yazar. Küçüksille, Ecir Uğur, yazar.<br/>Yer Numarası TK5105.59 Y35 2015<br/>Format: Gri Yayınlar<br/>Durum Beytepe Kütüphanesi~1<br/>Hacking Interfaceent://SD_ILS/0/SD_ILS:3178472024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Elbahadır, Hamza.<br/>Yer Numarası QA 76.9 A25 E43 2014<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>Her yönüyle siber savaşent://SD_ILS/0/SD_ILS:3414742024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Çiftci, Hasan.<br/>Yer Numarası QA76.9.C66 C48 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Information security for managersent://SD_ILS/0/SD_ILS:5165702024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Workman, Michael D., 1957-. Phelps, Daniel C. Gathegi, John N.<br/>Yer Numarası HF5548.37 W67 2013<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3862412024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Kahate, Atul.<br/>Yer Numarası TK5105.59 K12 2011<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Configuring Juniper Networks NetScreen & SSG firewallsent://SD_ILS/0/SD_ILS:1121542024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Cameron, Rob. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491181">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Bilişim ekonomisi ve E-Ticaret : yasal alt yapısı, dünya ve Türkiye uygulamaları, vergilendirilmesient://SD_ILS/0/SD_ILS:1232382024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Akbulut, Akın.<br/>Yer Numarası HF5548.32 .A33 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Security+ study guide & DVD training systement://SD_ILS/0/SD_ILS:1121402024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Cross, Michael, 1965- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491532">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Integrated security systems design concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1121752024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Norman, Thomas, CSC. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780750679091">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Making search work : implementing Web, intranet, and enterprise searchent://SD_ILS/0/SD_ILS:1271242024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar White, Martin S.<br/>Yer Numarası ZA4230 .W48 2007<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>How to cheat at configuring Open Source security toolsent://SD_ILS/0/SD_ILS:1121022024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Alder, Raven.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491709">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Voip securityent://SD_ILS/0/SD_ILS:1121062024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Porter, Thomas, PhD. Gough, Michael. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491693">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Snort IDS and IPS toolkitent://SD_ILS/0/SD_ILS:1121122024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Beale, Jay Baker, Andrew R. Esler, Joel. Northcutt, Stephen. Kohlenberg, Toby.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490993">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Network security assessment from vulnerability to patchent://SD_ILS/0/SD_ILS:1121862024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Manzuik, Steve. Gold, André. Gatford, Chris. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491013">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>PCI compliance implementing effective PCI data security standardsent://SD_ILS/0/SD_ILS:1121892024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Bradley, Tony, 1969- ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491655">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Techno Security's guide to managing risks for IT managers, auditors, and investigatorsent://SD_ILS/0/SD_ILS:1122032024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Wiles, Jack. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491389">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at Windows System Administration using command line scriptsent://SD_ILS/0/SD_ILS:1121072024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Bhardwaj, Pawan K. Andreou, Kimon. Barber, Brian. Kleiman, Dave. Satyanarayana, Mahesh.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491051">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing and building enterprise DMZsent://SD_ILS/0/SD_ILS:1121592024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Dubrawsky, Ido. Baumrucker, C. Tate. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491006">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure your network for free using NMAP, wireshark, snort, nessus, and MRTGent://SD_ILS/0/SD_ILS:1121972024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Seagren, Eric. ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491235">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Handbook of information securityent://SD_ILS/0/SD_ILS:1089092024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Bidgoli, Hossein, ed.<br/>Yer Numarası TK5105.59 H35 2006 V.1<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~3<br/>TCP / IP ve ağ güvenliği : teori ve uygulamalar ileent://SD_ILS/0/SD_ILS:1128132024-11-25T08:53:01Z2024-11-25T08:53:01ZYazar Dirican, Can Okan.<br/>Yer Numarası TK 5105.55 D5753 2005<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~2<br/>